Skip to content

Commit e28512a

Browse files
Deprecation Notice to Cloud Defend Rules (#4520)
* Deprecation Notice to Cloud Defend Rules * Udpate names in investigation guide * Adding deprecation note under Setup field * reverting back to setup field name --------- Co-authored-by: Isai <[email protected]>
1 parent 561ab70 commit e28512a

18 files changed

+141
-71
lines changed

rules/integrations/cloud_defend/container_workload_protection.toml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/04/05"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -16,12 +16,14 @@ index = ["logs-cloud_defend.alerts-*"]
1616
language = "kuery"
1717
license = "Elastic License v2"
1818
max_signals = 10000
19-
name = "Container Workload Protection"
19+
name = "Deprecated - Container Workload Protection"
2020
risk_score = 47
2121
rule_id = "4b4e9c99-27ea-4621-95c8-82341bc6e512"
2222
rule_name_override = "message"
2323
setup = """## Setup
2424
25+
This rule was deprecated in the 8.18 and 9.0 versions of the Elastic Stack due to deprecation of the 'Defend For Containers' integration. Users using 8.18+ versions should disable this rule and enable linux-based rules tagged "Domain: Container".
26+
2527
This rule is configured to generate more **Max alerts per run** than the default 1000 alerts per run set for all rules. This is to ensure that it captures as many alerts as possible.
2628
2729
**IMPORTANT:** The rule's **Max alerts per run** setting can be superseded by the `xpack.alerting.rules.run.alerts.max` Kibana config setting, which determines the maximum alerts generated by _any_ rule in the Kibana alerting framework. For example, if `xpack.alerting.rules.run.alerts.max` is set to 1000, this rule will still generate no more than 1000 alerts even if its own **Max alerts per run** is set higher.
@@ -42,7 +44,7 @@ note = """## Triage and analysis
4244
> **Disclaimer**:
4345
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
4446
45-
### Investigating Container Workload Protection
47+
### Investigating Deprecated - Container Workload Protection
4648
4749
Container Workload Protection is crucial for securing containerized environments by monitoring and defending against threats. Adversaries may exploit vulnerabilities in container orchestration or escape isolation to access host systems. The detection rule leverages alerts from cloud defense modules, focusing on suspicious activities within container domains, enabling timely triage and investigation of potential security incidents.
4850

rules/integrations/cloud_defend/credential_access_aws_creds_search_inside_a_container.toml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/06/28"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -16,7 +16,7 @@ index = ["logs-cloud_defend*"]
1616
interval = "5m"
1717
language = "eql"
1818
license = "Elastic License v2"
19-
name = "AWS Credentials Searched For Inside A Container"
19+
name = "Deprecated - AWS Credentials Searched For Inside A Container"
2020
references = ["https://sysdig.com/blog/threat-detection-aws-cloud-containers/"]
2121
risk_score = 47
2222
rule_id = "d0b0f3ed-0b37-44bf-adee-e8cb7de92767"
@@ -40,12 +40,16 @@ process where event.module == "cloud_defend" and
4040
(process.name : ("grep", "egrep", "fgrep", "find", "locate", "mlocate") or process.args : ("grep", "egrep", "fgrep", "find", "locate", "mlocate")) and
4141
process.args : ("*aws_access_key_id*", "*aws_secret_access_key*", "*aws_session_token*", "*accesskeyid*", "*secretaccesskey*", "*access_key*", "*.aws/credentials*")
4242
'''
43-
note = """## Triage and analysis
43+
note = """## Setup
44+
45+
This rule was deprecated in the 8.18 and 9.0 versions of the Elastic Stack due to deprecation of the 'Defend For Containers' integration. Users using 8.18+ versions should disable this rule and enable linux-based rules tagged "Domain: Container".
46+
47+
## Triage and analysis
4448
4549
> **Disclaimer**:
4650
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
4751
48-
### Investigating AWS Credentials Searched For Inside A Container
52+
### Investigating Deprecated - AWS Credentials Searched For Inside A Container
4953
5054
Containers often house applications that interact with AWS services, necessitating the storage of AWS credentials. Adversaries may exploit this by using search utilities to locate these credentials, potentially leading to unauthorized access. The detection rule identifies suspicious use of search tools within containers, flagging attempts to locate AWS credentials by monitoring specific process names and arguments, thus helping to prevent credential theft and subsequent attacks.
5155

rules/integrations/cloud_defend/credential_access_collection_sensitive_files_compression_inside_a_container.toml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/05/12"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -15,7 +15,7 @@ index = ["logs-cloud_defend*"]
1515
interval = "5m"
1616
language = "eql"
1717
license = "Elastic License v2"
18-
name = "Sensitive Files Compression Inside A Container"
18+
name = "Deprecated - Sensitive Files Compression Inside A Container"
1919
risk_score = 47
2020
rule_id = "475b42f0-61fb-4ef0-8a85-597458bfb0a1"
2121
severity = "medium"
@@ -65,12 +65,16 @@ and process.args: (
6565
"/etc/shadow",
6666
"/etc/gshadow")
6767
'''
68-
note = """## Triage and analysis
68+
note = """## Setup
69+
70+
This rule was deprecated in the 8.18 and 9.0 versions of the Elastic Stack due to deprecation of the 'Defend For Containers' integration. Users using 8.18+ versions should disable this rule and enable linux-based rules tagged "Domain: Container".
71+
72+
## Triage and analysis
6973
7074
> **Disclaimer**:
7175
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
7276
73-
### Investigating Sensitive Files Compression Inside A Container
77+
### Investigating Deprecated - Sensitive Files Compression Inside A Container
7478
7579
Containers are lightweight, portable environments used to run applications consistently across different systems. Adversaries may exploit compression utilities within containers to gather and exfiltrate sensitive files, such as credentials and configuration files. The detection rule identifies suspicious compression activities by monitoring for specific utilities and file paths, flagging potential unauthorized data collection attempts.
7680

rules/integrations/cloud_defend/credential_access_sensitive_keys_or_passwords_search_inside_a_container.toml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/05/12"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -16,7 +16,7 @@ index = ["logs-cloud_defend*"]
1616
interval = "5m"
1717
language = "eql"
1818
license = "Elastic License v2"
19-
name = "Sensitive Keys Or Passwords Searched For Inside A Container"
19+
name = "Deprecated - Sensitive Keys Or Passwords Searched For Inside A Container"
2020
references = ["https://sysdig.com/blog/cve-2021-25741-kubelet-falco/"]
2121
risk_score = 47
2222
rule_id = "9661ed8b-001c-40dc-a777-0983b7b0c91a"
@@ -47,12 +47,16 @@ or
4747
and process.args : ("*id_rsa*", "*id_dsa*")
4848
))
4949
'''
50-
note = """## Triage and analysis
50+
note = """## Setup
51+
52+
This rule was deprecated in the 8.18 and 9.0 versions of the Elastic Stack due to deprecation of the 'Defend For Containers' integration. Users using 8.18+ versions should disable this rule and enable linux-based rules tagged "Domain: Container".
53+
54+
## Triage and analysis
5155
5256
> **Disclaimer**:
5357
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
5458
55-
### Investigating Sensitive Keys Or Passwords Searched For Inside A Container
59+
### Investigating Deprecated - Sensitive Keys Or Passwords Searched For Inside A Container
5660
5761
Containers encapsulate applications, providing isolated environments. Adversaries may exploit search utilities like grep or find to locate sensitive credentials within containers, potentially leading to unauthorized access or container escape. The detection rule identifies suspicious searches for private keys or passwords, flagging potential credential access attempts by monitoring process activities and arguments.
5862

rules/integrations/cloud_defend/defense_evasion_ld_preload_shared_object_modified_inside_a_container.toml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/06/06"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -18,7 +18,7 @@ index = ["logs-cloud_defend*"]
1818
interval = "5m"
1919
language = "eql"
2020
license = "Elastic License v2"
21-
name = "Modification of Dynamic Linker Preload Shared Object Inside A Container"
21+
name = "Deprecated - Modification of Dynamic Linker Preload Shared Object Inside A Container"
2222
references = [
2323
"https://unit42.paloaltonetworks.com/hildegard-malware-teamtnt/",
2424
"https://www.anomali.com/blog/rocke-evolves-its-arsenal-with-a-new-malware-family-written-in-golang/",
@@ -34,12 +34,16 @@ type = "eql"
3434
query = '''
3535
file where event.module== "cloud_defend" and event.type != "deletion" and file.path== "/etc/ld.so.preload"
3636
'''
37-
note = """## Triage and analysis
37+
note = """## Setup
38+
39+
This rule was deprecated in the 8.18 and 9.0 versions of the Elastic Stack due to deprecation of the 'Defend For Containers' integration. Users using 8.18+ versions should disable this rule and enable linux-based rules tagged "Domain: Container".
40+
41+
## Triage and analysis
3842
3943
> **Disclaimer**:
4044
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
4145
42-
### Investigating Modification of Dynamic Linker Preload Shared Object Inside A Container
46+
### Investigating Deprecated - Modification of Dynamic Linker Preload Shared Object Inside A Container
4347
4448
The dynamic linker in Linux loads necessary libraries for programs at runtime, with the `ld.so.preload` file specifying libraries to load first. Adversaries exploit this by redirecting it to malicious libraries, gaining unauthorized access and evading detection. The detection rule identifies suspicious modifications to this file within containers, signaling potential hijacking attempts.
4549

rules/integrations/cloud_defend/discovery_suspicious_network_tool_launched_inside_a_container.toml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/04/26"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -24,7 +24,7 @@ index = ["logs-cloud_defend*"]
2424
interval = "5m"
2525
language = "eql"
2626
license = "Elastic License v2"
27-
name = "Suspicious Network Tool Launched Inside A Container"
27+
name = "Deprecated - Suspicious Network Tool Launched Inside A Container"
2828
risk_score = 47
2929
rule_id = "1a289854-5b78-49fe-9440-8a8096b1ab50"
3030
severity = "medium"
@@ -49,12 +49,16 @@ process where container.id: "*" and event.type== "start" and
4949
(process.args: ("nc", "ncat", "nmap", "dig", "nslookup", "tcpdump", "tshark", "ngrep", "telnet", "mitmproxy", "socat", "zmap", "masscan", "zgrab"))
5050
)
5151
'''
52-
note = """## Triage and analysis
52+
note = """## Setup
53+
54+
This rule was deprecated in the 8.18 and 9.0 versions of the Elastic Stack due to deprecation of the 'Defend For Containers' integration. Users using 8.18+ versions should disable this rule and enable linux-based rules tagged "Domain: Container".
55+
56+
## Triage and analysis
5357
5458
> **Disclaimer**:
5559
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
5660
57-
### Investigating Suspicious Network Tool Launched Inside A Container
61+
### Investigating Deprecated - Suspicious Network Tool Launched Inside A Container
5862
5963
Containers are lightweight, portable units that encapsulate applications and their dependencies, often used to ensure consistent environments across development and production. Adversaries exploit network tools within containers for reconnaissance or lateral movement, leveraging utilities like `nc` or `nmap` to map networks or intercept traffic. The detection rule identifies these tools' execution by monitoring process starts and arguments, flagging potential misuse for further investigation.
6064

rules/integrations/cloud_defend/execution_container_management_binary_launched_inside_a_container.toml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/04/26"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -24,7 +24,7 @@ index = ["logs-cloud_defend*"]
2424
interval = "5m"
2525
language = "eql"
2626
license = "Elastic Licence v2"
27-
name = "Container Management Utility Run Inside A Container"
27+
name = "Deprecated - Container Management Utility Run Inside A Container"
2828
risk_score = 21
2929
rule_id = "6c6bb7ea-0636-44ca-b541-201478ef6b50"
3030
severity = "low"
@@ -43,12 +43,16 @@ query = '''
4343
process where container.id: "*" and event.type== "start"
4444
and process.name: ("dockerd", "docker", "kubelet", "kube-proxy", "kubectl", "containerd", "runc", "systemd", "crictl")
4545
'''
46-
note = """## Triage and analysis
46+
note = """## Setup
47+
48+
This rule was deprecated in the 8.18 and 9.0 versions of the Elastic Stack due to deprecation of the 'Defend For Containers' integration. Users using 8.18+ versions should disable this rule and enable linux-based rules tagged "Domain: Container".
49+
50+
## Triage and analysis
4751
4852
> **Disclaimer**:
4953
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
5054
51-
### Investigating Container Management Utility Run Inside A Container
55+
### Investigating Deprecated - Container Management Utility Run Inside A Container
5256
5357
Container management utilities like Docker and Kubernetes are essential for orchestrating and managing containerized applications. They facilitate tasks such as deployment, scaling, and networking. However, adversaries can exploit these tools to execute unauthorized commands within containers, potentially leading to system compromise. The detection rule identifies suspicious execution of these utilities within containers, signaling possible misuse or misconfiguration, by monitoring specific process activities and event types.
5458

rules/integrations/cloud_defend/execution_file_made_executable_via_chmod_inside_a_container.toml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/04/26"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -16,7 +16,7 @@ index = ["logs-cloud_defend*"]
1616
interval = "5m"
1717
language = "eql"
1818
license = "Elastic License v2"
19-
name = "File Made Executable via Chmod Inside A Container"
19+
name = "Deprecated - File Made Executable via Chmod Inside A Container"
2020
risk_score = 47
2121
rule_id = "ec604672-bed9-43e1-8871-cf591c052550"
2222
severity = "medium"
@@ -39,12 +39,16 @@ file where container.id: "*" and event.type in ("change", "creation") and
3939
(process.name : "chmod" or process.args : "chmod") and
4040
process.args : ("*x*", "777", "755", "754", "700") and not process.args: "-x"
4141
'''
42-
note = """## Triage and analysis
42+
note = """## Setup
43+
44+
This rule was deprecated in the 8.18 and 9.0 versions of the Elastic Stack due to deprecation of the 'Defend For Containers' integration. Users using 8.18+ versions should disable this rule and enable linux-based rules tagged "Domain: Container".
45+
46+
## Triage and analysis
4347
4448
> **Disclaimer**:
4549
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
4650
47-
### Investigating File Made Executable via Chmod Inside A Container
51+
### Investigating Deprecated - File Made Executable via Chmod Inside A Container
4852
4953
Containers provide isolated environments for running applications, often on Linux systems. The `chmod` command is used to change file permissions, including making files executable. Adversaries may exploit this by altering permissions to execute unauthorized scripts or binaries, potentially leading to malicious activity. The detection rule identifies such actions by monitoring for `chmod` usage that grants execute permissions, focusing on specific permission patterns, and excluding benign cases. This helps in identifying potential threats where attackers attempt to execute unauthorized code within containers.
5054

rules/integrations/cloud_defend/execution_interactive_exec_to_container.toml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
creation_date = "2023/05/12"
33
integration = ["cloud_defend"]
44
maturity = "production"
5-
updated_date = "2025/01/15"
5+
updated_date = "2025/02/06"
66

77
[rule]
88
author = ["Elastic"]
@@ -28,7 +28,7 @@ index = ["logs-cloud_defend*"]
2828
interval = "5m"
2929
language = "eql"
3030
license = "Elastic License v2"
31-
name = "Interactive Exec Command Launched Against A Running Container"
31+
name = "Deprecated - Interactive Exec Command Launched Against A Running Container"
3232
references = [
3333
"https://kubernetes.io/docs/tasks/debug/debug-application/debug-running-pod/",
3434
"https://kubernetes.io/docs/tasks/debug/debug-application/get-shell-running-container/",
@@ -59,12 +59,16 @@ process.entry_leader.same_as_process== true and
5959
/* interactive process */
6060
process.interactive == true
6161
'''
62-
note = """## Triage and analysis
62+
note = """## Setup
63+
64+
This rule was deprecated in the 8.18 and 9.0 versions of the Elastic Stack due to deprecation of the 'Defend For Containers' integration. Users using 8.18+ versions should disable this rule and enable linux-based rules tagged "Domain: Container".
65+
66+
## Triage and analysis
6367
6468
> **Disclaimer**:
6569
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
6670
67-
### Investigating Interactive Exec Command Launched Against A Running Container
71+
### Investigating Deprecated - Interactive Exec Command Launched Against A Running Container
6872
6973
In containerized environments, the 'exec' command is used to run processes inside a running container, often for debugging or administrative tasks. Adversaries may exploit this to gain shell access, potentially leading to further compromise or container escape. The detection rule identifies such activities by monitoring for interactive 'exec' sessions, focusing on initial processes within containers, and flagging high-risk interactions.
7074

0 commit comments

Comments
 (0)